Wednesday 8 September 2010

cheap nfl jerseys puter Security

What is puter security? puter security is a branch of applied information technology such as puter science known. Information security meacheap nfl jerseysns protecting information and information systems against unauthorized access, use, disclosure, alteration or destruction. The goal of puter security varies and can protect information from theft or corruption, or the preservation of availability, are as defined in the security policy.
puter security imposes requirements on puters that have different system requirements, since the form of restrictions on what the puters do not.

? Restrict physical access to puters for those who do not present a security risk.

? Hardware mechanisms that impose rules on puter programs, and the role of puter security software.

? Operating system mechanisms that impose rules on puter programs to prevent trusts.

? Planning strategies for puter programs reliable and resist subversion.



Hacking: Unauthorized use or attempts to circumvent or bypass the security mechanisms of an information and networking.
Hacking is always with a certain degree of invasion of privacy of any person or property damage to puter files, web pages or software. The effects onfl apparelf puter hacking varies from simply annoying, invasive and illegal.
Cracking:
The act of breaking into a puter system.
Software Cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware.
The most mon software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.

Phreaking:
The art and science of cracking the phone network.Security by design:
The technologies of puter security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a puter 2 Cowboys jerseyapplication, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.
There are several approaches to security in puting; sometimes a bination of approaches is valid:

Trust all the software to abide by a security policy but the software is not trustworthy (this is puter insecurity).

Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).
1. Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is puter insecurity).
2. Trust no software but enforce a security policy with trustworthy mechanisms
12 tips for puter security:
1. Update / patch ALL your software every now and then!
2. Check / adjust ALL your settings so they are safe, since they ARENT by default!
3. Use firewall, like ZoneAlarm to control what goes in and out from your puter!
4. Use good passwords: at least 13marks long, containing both letters and numbers. Remember to change your password every few months atleast and dont ever use the same password in two places!
5. Get a good antivirus program: NOD32, F-Secure or Norton Antivirus and keep it updated!
6. Don’t open or execute files that you are not 100% sure are absolutely safe nomatter where or how you get them.
7. Wipe your historyfiles (like cookies, internet history and temporary files, etc.), logs and personal files, with specific wiping program (like Eraser) instead of just deleting them.
8. Use encryption to enhance your privacy! Use encrypv your puter (PGP).
9. When you are finished using some internet-based service like email, sign out of it rather than just closing your browser! Also, when you leave your puter, make sure that none of such programs or connections are left open that someone could abuse. In WindowsNT/2k/XP, press Windowskey+L to lock the workstation.
10. Don’t use public puters for anything you need to type in your logins, they usually have Trojan horses that capture your passwords.
11. Make backups and store them in safe place! Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location, but floppies will usually be just fine for storing documents, etc.
12. Install and Use a Hardware Firewall

No comments:

Post a Comment